From: Peter Eisentraut Date: Thu, 18 Jan 2018 18:00:49 +0000 (-0500) Subject: Fix typo and improve punctuation X-Git-Tag: REL_11_BETA1~926 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=958c7ae0b7ca4ee9d422271c2ffbef4e3a6d1c47;p=postgresql Fix typo and improve punctuation --- diff --git a/src/test/ssl/t/001_ssltests.pl b/src/test/ssl/t/001_ssltests.pl index a0a06825c6..28837a1391 100644 --- a/src/test/ssl/t/001_ssltests.pl +++ b/src/test/ssl/t/001_ssltests.pl @@ -46,20 +46,20 @@ note "running client tests"; $common_connstr = "user=ssltestuser dbname=trustdb sslcert=invalid hostaddr=$SERVERHOSTADDR host=common-name.pg-ssltest.test"; -# The server should not accept non-SSL connections +# The server should not accept non-SSL connections. note "test that the server doesn't accept non-SSL connections"; test_connect_fails($common_connstr, "sslmode=disable"); # Try without a root cert. In sslmode=require, this should work. In verify-ca -# or verify-full mode it should fail +# or verify-full mode it should fail. note "connect without server root cert"; test_connect_ok($common_connstr, "sslrootcert=invalid sslmode=require"); test_connect_fails($common_connstr, "sslrootcert=invalid sslmode=verify-ca"); test_connect_fails($common_connstr, "sslrootcert=invalid sslmode=verify-full"); -# Try with wrong root cert, should fail. (we're using the client CA as the -# root, but the server's key is signed by the server CA) -note "connect without wrong server root cert"; +# Try with wrong root cert, should fail. (We're using the client CA as the +# root, but the server's key is signed by the server CA.) +note "connect with wrong server root cert"; test_connect_fails($common_connstr, "sslrootcert=ssl/client_ca.crt sslmode=require"); test_connect_fails($common_connstr,